In a two-tier network architecture, the collapsed core layer typically combines the core and distribution layers of a three-tier architecture into a single layer. The main function of the collapsed core layer is to provide high-speed switching and routing of traffic between the distribution layer switches and the access layer switches. Therefore, the answer to your question is A. enforcing routing policies.
low cost at first but will be difficult to scale in future, because cable requirement increase, each new site require full mash to other building due no to centralize core, also increase routing complexity and addition routing peer needed in new protocol. Three-tier will be more efficient.
D. Attaching users to the edge of the network.
Explanation:
In a network design that follows a collapsed core architecture, the core and distribution layers are combined into a single layer. This design is often used in smaller networks to simplify the network architecture and reduce complexity.
The collapsed core layer primarily focuses on connecting end-user devices or access switches to the network. It aggregates traffic from the access layer and provides connectivity for users, servers, and other network devices. It's responsible for attaching users and devices to the edge of the network.
The other options (A, B, and C) are not typically specific functions performed by the collapsed core layer in a two-tier architecture. They may be associated with other layers or components in the network architecture.
Correct Answer is D. Attaching users to the edge of the network.
In a two-tier network architecture, the collapsed core layer serves as the middle layer between the access layer and the distribution layer. Its primary function is to provide high-speed connectivity for the distribution layer switches and to attach the users to the edge of the network.
Option A is incorrect because enforcing routing policies is typically done at the distribution layer.
Option B is incorrect because marking interesting traffic for data policies is also typically done at the distribution layer.
Option C is incorrect because applying security policies is typically done at the access layer, distribution layer, and sometimes the core layer, depending on the network design.
This section is not available anymore. Please use the main Exam Page.200-301 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ciscoman021
Highly Voted 1 year, 7 months agoBenjamin8189
Highly Voted 3 years, 2 months agoLausell
Most Recent 1 year agoUtshav
1 year, 2 months agoSajeda_Deeb
1 year, 1 month agoSublime_Cheese
8 months agoIsuzu
1 year, 6 months agomoise_amo
1 year, 9 months agoJulietaMT98
2 years, 8 months agoZUMY
3 years, 2 months ago